
Summary
This detection rule identifies the use of 'bitsadmin' on Windows systems to download files with potentially malicious or unusual file extensions. 'Bitsadmin' is a command-line tool utilized for creating, downloading, or uploading files. The rule focuses on monitoring process creation events where 'bitsadmin.exe' is executed, specifically looking for command line arguments that indicate a file is being downloaded. It includes criteria for filtering based on known suspicious file extensions such as 'exe', 'zip', 'bat', and various other script and compressed formats typically associated with malware distribution. The rule combines multiple detection selections that must all trigger for an alert to be raised, ensuring a robust defense mechanism against this specific technique used in attack scenarios. Given its nature, the rule is classified as high severity due to the implications of files downloaded with such extensions potentially introducing malware into the environment.
Categories
- Windows
- Network
Data Sources
- Process
Created: 2022-06-28